Sciweavers

3555 search results - page 180 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
AAAI
2011
14 years 4 months ago
Reasoning About General Games Described in GDL-II
Recently the general Game Description Language (GDL) has been extended so as to cover arbitrary games with incomplete/imperfect information. Learning—without human interventionâ...
Stephan Schiffel, Michael Thielscher
ACL
2012
13 years 6 months ago
Entailment-based Text Exploration with Application to the Health-care Domain
We present a novel text exploration model, which extends the scope of state-of-the-art technologies by moving from standard concept-based exploration to statement-based exploratio...
Meni Adler, Jonathan Berant, Ido Dagan
APSEC
1999
IEEE
15 years 8 months ago
The Quest for Correct Systems: Model Checking of Diagrams and Datatypes
For the practical development of provably correct software for embedded systems the close integration of CASE tools and verification tools is required. This paper describes the co...
Jan Philipps, Oscar Slotosch
TROB
2002
244views more  TROB 2002»
15 years 3 months ago
Distributed surveillance and reconnaissance using multiple autonomous ATVs: CyberScout
The objective of the CyberScout project is to develop an autonomous surveillance and reconnaissance system using a network of all-terrain vehicles. In this paper, we focus on two f...
Mahesh Saptharishi, C. Spence Oliver, Christopher ...
AI
2011
Springer
14 years 11 months ago
Relational preference rules for control
Much like relational probabilistic models, the need for relational preference models arises naturally in real-world applications where the set of object classes is ïŹxed, but obj...
Ronen I. Brafman